Log in

An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The continuous advancement of computer networks has given rise to grave concerns regarding security and susceptibility. Network administrators utilize intrusion detection systems (IDS) to deliver essential network security. Current IDS devices produce false alarms in response to routine user activities rather than detecting novel assaults. Neural networks may be used to overcome this problem and increase detection accuracy. In this paper, we propose a hybrid approach based on neural networks and correlation-based feature selection to detect anomalies. Experimental research is done on the standard dataset NSL-KDD for intrusion detection using current attacks. We introduce a novel hybrid crowd search analysis optimization with an artificial neural network (HCSAOANN). The findings demonstrate that it outperforms in high accuracy, precision, F1-Score, and recall. In the proposed HCSAOANN algorithm, to explore the feature space, we merged the crow search optimization (CSO), which can converge into the overall best solution in the search function, with the upgraded version of the crow search analysis method. Some performance criteria were applied in the studies using an artificial neural network (ANN) as a classifier. The HCSAOANN methodology outperformed as compared to the previous fuzzy technique and achieved 98% accuracy and a 98% precision rate, which is 2.2% better than the previous CSO-ANFIS technique and 8.87% superior to the FC-ANN technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data Availability

The data and material of the manuscript is available.

Code Availability

The code is available in GitHub.

References

  1. Manimurugan, S., Majdi, A.-Q., Mustaffa Mohmmed, C., & Narmatha, R. V. (2020). Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocessors and Microsystems. https://doi.org/10.1016/j.micpro.2020.103261

    Article  Google Scholar 

  2. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111, 2287–2310. https://doi.org/10.1007/s11277-019-06986-8

    Article  Google Scholar 

  3. Lifandali, O., Abghour, N., & Chiba, Z. (2023). Feature selection using a combination of ant colony optimization and random forest algorithms applied to isolation forest based intrusion detection system. Procedia Computer Science, 220, 796–805. https://doi.org/10.1016/j.procs.2023.03.106

    Article  Google Scholar 

  4. Almasoudy, F. H., Al-Yaseen, W. L., & Idrees, A. K. (2020). Differential evolution wrapper feature selection for intrusion detection system. Procedia Computer Science, 167, 1230–1239. https://doi.org/10.1016/j.procs.2020.03.438

    Article  Google Scholar 

  5. Alsarhan, A., Alauthman, M., Alshdaifat, E., Al-Ghuwairi, A. R., & Al-Dubai, A. (2021). Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-02963-x

    Article  Google Scholar 

  6. Dwivedi, S., Vardhan, M., & Tripathi, S. (2021). Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing, 24(3), 1881–1900. https://doi.org/10.1007/s10586-020-03229-5

    Article  Google Scholar 

  7. Singhal, A., Maan, A., Chaudhary, D., & Vishwakarma, D. (2021). A Hybrid machine learning and data mining based approach to network intrusion detection. International conference on artificial intelligence and smart systems (ICAIS), Coimbatore, India, pp 312–318. Doi: https://doi.org/10.1109/ICAIS50930.2021.9395918.

  8. Sivagaminathan, V., Sharma, M., & Henge, S. K. (2023). Intrusion detection systems for wireless sensor networks using computational intelligence techniques. Cyber security. https://doi.org/10.1186/s42400-023-00161-0

    Article  Google Scholar 

  9. Prasad, S. N., Selvan, K. S., & Dhevi, B. L. (2021). Intrusion detection system in wireless sensor networks and fair resource allocation using geometric deep learning techniques. Wireless Personal Communications, 123(4), 3401–3412. https://doi.org/10.1007/s11277-021-09294-2

    Article  Google Scholar 

  10. Ka Mushtaq, E., Zameer, A., & Khan, A. (2022). A two-stage stacked ensemble intrusion detection system using five base classifiers and MLP with optimal feature selection. Microprocessor Microsystem. https://doi.org/10.1016/j.micpro.2022.104660

    Article  Google Scholar 

  11. Wu, Z., Wang, J., Hu, L., Zhang, Z., & Wu, H. (2020). A network intrusion detection method based on semantic re-encoding and deep learning. Journal of Network and Computer Applications. https://doi.org/10.1016/J.JNCA.2020.102688

    Article  Google Scholar 

  12. Siddique, K., Akhtar, Z., Khan, F. A., & Kim, Y. (2019). KDD cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. IEEE Computer, 52(2), 41–51. https://doi.org/10.1109/mc.2018.2888764

    Article  Google Scholar 

  13. Sadhasivan, D. K., & Balasubramanian, K. (2017). A fusion of multiagent functionalities for effective intrusion detection system. Security Communication Networks. https://doi.org/10.1155/2017/6216078

    Article  Google Scholar 

  14. Ingre, B., & Yadav, A. (2015). Performance analysis of NSL-KDD dataset using ANN. International Conference on Signal Processing. https://doi.org/10.1109/spaces.2015.7058223

    Article  Google Scholar 

  15. Ghazy, R. A., El-Rabaie, E. M., Dessouky, M. I., El-Fishawy, N., & El-Samie, F. E. A. (2020). Feature selection ranking and subset-based techniques with different classifiers for intrusion detection. Wireless Personal Communications, 111(1), 375–393. https://doi.org/10.1007/s11277-019-06864-3

    Article  Google Scholar 

  16. Mohd, N., Singh, A., & Bhadauria, H. S. (2021). Intrusion detection system based on hybrid hierarchical classifiers. Wireless Personal Communications, 121(1), 659–686. https://doi.org/10.1007/s11277-021-08655-1

    Article  Google Scholar 

  17. Gao, B., Bu, B., Zhang, W., & Li, X. (2021). An intrusion detection method based on machine learning and state observer for train-ground communication systems. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2021.3058553

    Article  Google Scholar 

  18. Sinha, S., & Paul, A. (2020). Neuro-fuzzy based intrusion detection system for wireless sensor network. Wireless Personal Communications, 114, 835–851. https://doi.org/10.1007/s11277-020-07395-y

    Article  Google Scholar 

  19. Ridwan, M. A., Radzi, N. A. M., Abdullah, F., & Jalil, Y. E. (2021). applications of machine learning in networking: A survey of current issues and future challenges. IEEE Access, 9, 52523–52556. https://doi.org/10.1109/ACCESS.2021.3069210

    Article  Google Scholar 

  20. Zhou, Y., Cheng, G., Jiang, S., & Dai, M. (2020). Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Network. https://doi.org/10.1016/j.comnet.2020.107247

    Article  Google Scholar 

  21. Saleh, A. I., Talaat, F. M., & Labib, L. M. (2017). A Hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Artificial Intelligence Review, 51, 403–443. https://doi.org/10.1007/s10462-017-9567-1

    Article  Google Scholar 

  22. Karatas, G., Demir, O., & Sahingoz, O. K. (2020). Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access, 8, 32150–32162. https://doi.org/10.1109/access.2020.2973219

    Article  Google Scholar 

  23. Aslahi-Shahri, B., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., & Golkar, M. (2015). A hybrid method consisting of GA and SVM for intrusion detection system. Neural Computing and Application, 27(6), 1669–1676. https://doi.org/10.1007/s00521-015-1964-2

    Article  Google Scholar 

  24. Lin, P., Ye, K., & Xu, C.-Z. (2019). dynamic network anomaly detection system by using deep learning techniques. Cloud Computing Cloud. https://doi.org/10.1007/978-3-030-23502-4_12

    Article  Google Scholar 

  25. Kanimozhi, V., & Prem, J. T. (2019). Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express, 5(3), 211–214. https://doi.org/10.1016/j.icte.2019.03.003

    Article  Google Scholar 

  26. Ma, T., Wang, F., Cheng, J., Yu, Y., & Chen, X. (2016). A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Topology Control in Emerging Sensor Networks. https://doi.org/10.3390/S16101701

    Article  Google Scholar 

  27. Ferrag, M. A., Maglaras, L. A., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. Journal of Information Security and Applications. https://doi.org/10.1016/J.JISA.2019.102419

    Article  Google Scholar 

  28. Atefinia, R., & Ahmadi, M. (2021). network intrusion detection using multi-architectural modular deep neural network. Journal of Supercomputing, 77, 3571–3593. https://doi.org/10.1007/s11227-020-03410-y

    Article  Google Scholar 

  29. Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525–41550. https://doi.org/10.1109/ACCESS.2019.2895334

    Article  Google Scholar 

  30. Roshan, S., Roshan, S., Miche, Y., Akusok, A., & Lendasse, A. (2018). Adaptive and online network intrusion detection system using clustering and extreme learning machines. Journal of the Franklin Institute. https://doi.org/10.1016/J.JFRANKLIN.2017.06.006

    Article  Google Scholar 

  31. Ali, M. H., Al Mohammed, B. A. D., Ismail, A., & Zolkipli, M. F. (2018). A new intrusion detection system based on fast learning network and particle Swarm optimization. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2820092

    Article  Google Scholar 

  32. Aburomman, A. A., & IbneReaz, M. B. (2016). A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft Computing. https://doi.org/10.1016/J.ASOC.2015.10.011

    Article  Google Scholar 

  33. Dongzi, J., Yiqin, L., Jiancheng, Q., Zhe, C., & Zhongshu, M. (2020). SwiftIDS: Real-time intrusion detection system based on lightGBM and parallel intrusion detection mechanism. Computers & Security. https://doi.org/10.1016/J.COSE.2020.101984

    Article  Google Scholar 

  34. Yu, Y., & Bian, N. (2020). An intrusion detection method using few-shot learning. IEEE Access, 8, 49730–49740. https://doi.org/10.1109/ACCESS.2020.2980136

    Article  Google Scholar 

  35. Chouhan, N., Khan, A., & Khan, H.-U.-R. (2019). Network anomaly detection using channel boosted and residual learning based deep convolutional neural network. Applied Soft Computing. https://doi.org/10.1016/j.asoc.2019.105612

    Article  Google Scholar 

Download references

Funding

No funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chetan Gupta.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, C., Kumar, A. & Jain, N.K. An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network. Wireless Pers Commun 134, 43–68 (2024). https://doi.org/10.1007/s11277-024-10880-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10880-3

Keywords

Navigation